|
|
|
|
All In One Keylogger Special Features
Captures all keystrokes (Facebook Keystrokes Logger).
Records instant messengers.
Monitors application usage.
Captures desktop activity.
Captures screenshots (Screenshots Keylogger).
Quick search over the log.
Sends reports via e-Mail, FTP, Network.
Record Microphone sounds.
Generates HTML reports.
Disable Anti Keyloggers.
Disable unwanted software.
Filters monitored user accounts.
Captured screenshots "Slide Show".
Sends reports by FTP.
Sends reports in HTML format.
Blocks unwanted URLs.
Stops logging when computer is Idle.
New - Invisible in Task Manager (All Windows Versions).
New - Captures mouse Cursor.
New - Support for Dual Monitor.
New - Sends Logs Via Network.
New - Advanced Search for Log Viewer.
New v2.8 Full support for Windows Vista.
New v2.8 Captures snapshots of semi transparent Windows.
New v2.9 Visual Surveillance filtering.
New v2.9 Support for Firefox web monitoring In addition to Internet Explorer.
New v2.9 Takes screenshot when one of predefined keywords is typed.
New v3 Auto Uninstall at a specific date.
New v3 Automatically flushes logs to a USB stick or to External HardDisk.
New v3 Textual Surveillance filtering.
New v3 Keylogger was translated to Czech (Cestina).
New v3.1 2-Sides IM Logging.
New v3.1 Option to set Keyloger to capture only the active Window.
New v3.1 Support for Opera web monitoring In addition to Internet Explorer & Firefox.
New v3.1 Keylogger was translated to German (Deutsch), French (Francais), Dutch (Nederlands), Italian (Italiano), Spanish (Espanol) and Portuguese (Portugues).
New v3.2 Full support for Windows 7 (Win7).
New v3.2 Keylogger was translated to Swedish (Svensk).
New v3.3 Keylogger was translated to Norwegian (Norske).
New v3.3 Keylogger was translated to Turkish (Trke).
New v3.3 Full support for Windows 64bit OS.
New v3.4 E-Mail delivery now supports SSL-TLS/STARTTLS.
New v3.5 Monitor user Idle Time (System Inactivity).
New v3.6 Option to automatically send logs when keywords are typed (applicable to E-mail/FTP and LAN).
New v3.7 Full support for Windows 8 (Win8).
New v3.7 Option to automatically send notification when keywords are typed (applicable to E-mail/FTP and LAN)
New v3.7 File monitoring - records paths and names of files or directories that are created, deleted or renamed.
New v3.7 Keylogger was translated to Polish (Polski).
New v3.8 Full support for Windows 8.1 (Win 8.1).
New v3.9 Pre-Configured Installation option.
New v4 Keylogger was translated to Hungarian (Magyar).
New v4 Full support for Windows 10 (Win 10).
New v4.1 FTP delivery now supports TLS.
New v4.2 WebCam Capturing Support (Web Camera Logger)
New v4.3 Option to upload WebCam log using the send logs via LAN (network) option
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Testimonials: |
Thanks to this Keylogger software my wife and I could understand that our daughter is suffering from cyber bullying.
We could find in the logs who are the kids that harass her and we put an end to that.
David
Thank you for your support.
This Keylogger software when used responsibly can save lives and is without doubt the best Keylogger software available.
It is heartening to find a quick and efficient after sales service for something so inexpensive even some years after purchase.
The internet is full of sharks it is so nice to have stumbled across a mermaid !
Thank you again. Mark
I downloaded the Keylogger, Keystrokes Recorder, trial and installed this software just to see what it can do and
forgot all about it.
A few days later, I suddenly remembered it.
I typed the Keylogger password, looked at my kid's logs and was shocked.
My spouse had a conversation with them without telling them about this keystroke logger installed
on their computer.
I purchased this wonderful software and ever since, I randomly look in the logs
to keep them from getting into troubles.
I can not thank enough to the authors of this fabulous software.
Regards, Todd.
I bought and installed this Key logger software. After a few days I started reading the logs
and was amazed.
I found out my daughter (13 yr), had a chat with someone in a kid's chat room.
He wrote her that he was in her age.
He wrote her e-mails a kid in her age shouldn't read.
He said he wanted to be her boyfriend, and wanted to meet her. I immediately contacted
the local authorities.
They made some research, and found out he was 28 years old, and lives a few miles
away from us. Thank for this key logger tool nothing had happened to my daughter and I am very
grateful for that.
- McCarron
My husband Installed All In One Keylogger on our family computer to watch our daughter internet activities.
Unfortunately, our daughter is experiencing some real ... troubles right now and
I rely on your wonderful spy software every day to know where her safety level might
stand. You guys are providing a vital service to us. We sleep better at night at
least knowing what's going on in our daughter's head because of your system.
Thank you.
Hi there, can I just say how grateful I am for this piece of program! I have two children, the oldest of which was spending hours
on her laptop in the evening. I am hopeless with computers, but after installing your Keylogger, I found she was spending her time on this
'omegle' website, not something any father wants her daughter to be using. Anyway, laptop confiscated for two months until she learns how to use it properly.
Will.
Thank you for the great Keystrokes Logger.
All In One Keystrokes Recorder has already helped me after only 3 days.
I have been able to confirm activities by my children that I have suspected for a while.
It has also helped me when I have forgotten login info for an account that I do not use regularly and have trouble remembering.
Robert.
All in One Keylogger in itself is an excellent product; the best one I've seen in its category
(and I've tested many of these Keystrokes Loggers) mainly because of its user-friendliness and stealthiness.
It is money well spent...that's all I can say. The money you spend here might change your life
(in my opinion for better) permanently, so in the long run or short run, it's definitely worth it.
Aside from this, the teach support team is very quick and willing to help.
Thank you Relytec!
A very happy customer.
Like others who need to keep a watchful eye on their significant others computer activity I decided to give Keystrokes Recorder a try! This product ROCKS! It is a life saver. The product runs silently keeping an watchful eye on all computer activity AND reports to me everything I need. This product gives me peace and mind and gives me the opportunity to decide what to do with my relationship! I can sleep at night knowing that Keylogger is doing its thing. Thank you for such a wonderful product!
I.River.
I downloaded this keystrokes logger about 6 months ago. It is the best product I have ever purchased. I told all my friends about this Keylogger Software, and they have also downloaded it. This product puts my mind at ease knowing what's going on with my computer.
Thanks!
M.Scott.
I purchased "All In One Keyloger" almost 3 years ago and have been phenomenally satisfied. It has reliably sent me Reports every hour for that entire time. It has been stable and fully functional throughout. My family knows it exists and my three children have moderated their internet usage with the knowledge that "Dad is always watching".
I couldn't have asked for more and have made sure that anyone with children is aware of your product.
K.Don
I would like to say a few things about this Computer Spy Software, for one I would highly recommend this to any parent who would like to keep an eye on there children myspace or facebook etc... and its also very simple to use anybody who can turn a pc on can pretty much use this Keylogger. I will definitely be purchasing this program in the near future 10/10.
Ted
Relytec is a great company, support is outstanding with instant turn around.
Support is extremely professional and friendly.
All questions are quickly answered and it is not a canned response that you get from most other companies.
Relytec cares about their customers.
I highly recommend Relytec.
$69 was very well spent with this.
TC
I downloaded the free trial, installed the monitoring software and it only took a short time to get the hang of it. I did my research on web and I found several Keyloggers that I was interested in. During my free trial period I downloaded the others which some were deleted quickly and the others I tried for a day or so. The "All In One Key Logger" was by far the best not only for the price but for what it can do. Also, it is very simple to navigate and being able to set the screen captures for seconds was something that most others did not have. I set mine for 3 sec because a picture can be worth a thousand words! I have been looking for a program like this for several reasons. I wanted to know what was going on my lap top when I wasn't around. Keeping tabs on my kids is always a good idea. And I also wanted to log my own work and research in the case I needed to review it at the end of the day. I could re-trace my own tracks of where I had been and what I said or typed. I can already see that there are more uses than I can think of at the moment. I just thought this program was worth a review. For those of you who are looking for a keyloger, I highly recommend this one. Congrats to the developers! You did a great job. Mike
I have a business and naturally have 100s of different programs on our computers. I have 5 copies of your Keylogger monitoring software. I have NEVER seen a software company as responsive and accurate as you are. I have been using your Keylogger program for over 7 years. I have never had any issues that were not solved by you at a very timely manner and your program has saved my company 100s of thousands of dollars by controlling key employees and preventing fraud.
All I can say is thank you!
K
Send us your testimonial!
|
|
|
|
|
|
|
|
|
|
|
All In One Keylogger team provides full support for the product.
|
|
|
We have listed some of our frequently asked questions below to
help guide you through any technical problems you may encounter.
If you have further questions we have included a support form
below. Please fill out all required fields before submitting your support ticket.
We respond to all support questions in the order they are received and will contact
you usually within 24 hours regarding your request.
You may find the answers to you question on our Keylogger Installation Tutorial, on our Online Help
site, or you can download All In One Keylogger help file, to view
it offline.
|
Jprofiler: License Key
<Header>.<Payload>.<Signature> | Component | Description | |-----------|-------------| | | JSON metadata (algorithm, version). Example: "alg":"RS256","typ":"JPROF" | | Payload | Encrypted JSON object containing: • type – “node”, “floating”, “enterprise”, or “trial”. • exp – UNIX timestamp of expiration. • issued – Issue date. • host – For node‑locked: MAC address / Windows SID. • maxClients – For floating: max concurrent sessions. • features – Enabled modules (CPU, memory, database, etc.). | | Signature | RSA‑2048 signature generated by ej‑technologies’ private key, ensuring tamper‑proofness. |
auth: type: ldap url: ldap://ad.example.com baseDn: dc=example,dc=com bindDn: cn=serviceaccount,ou=users,dc=example,dc=com bindPassword: $LDAP_BIND_PASSWORD | Phase | Recommended Action | |-------|---------------------| | Provisioning | Store the key in a read‑only directory with restricted OS permissions (e.g., chmod 440 ). Use a secrets‑management tool (Vault, Azure Key Vault) for automated CI pipelines. | | Distribution | For node‑locked keys, use a configuration‑management tool (Ansible, Chef) to push the file. For floating, keep the server binary under version control and deploy via container orchestration (Docker/K8s). | | Renewal | Set calendar reminders 30 days before exp timestamp. The portal provides a “Renew” button that issues a new key with an extended expiry while preserving the same host binding. | | Revocation | If a workstation is decommissioned, re‑issue a new node‑locked key (excluding the retired host). For floating servers, simply remove the host from the allowed IP list in config.yml . | | Auditing | Enable JProfiler’s license‑usage logs ( jprofiler.log ) and forward them to a SIEM. Logs contain entries such as License granted to host <MAC> , Floating license checked out by user X . | 7. Common Issues & Troubleshooting | Symptom | Likely Cause | Fix | |---------|--------------|-----| | “Invalid license key” dialog at startup | Corrupted .lic file (line‑breaks, whitespace) | Re‑download from portal; ensure file is stored exactly as received. | | “License expired on …” | Expiration date reached (check exp field with a Base64 decoder) | Renew license via portal; replace the key. | | “Host mismatch” (node‑locked) | The key was generated for a different MAC/Windows SID | Regenerate the key for the current host; verify host identifier using jprofiler --show-host-id . | | “Maximum number of concurrent users reached” (floating) | All floating slots are occupied | Increase maxClients in the server configuration or free a slot (stop a profiler session). | | “Cannot connect to license server” | Network/firewall block on port (default 8849) | Open the port; configure proxy settings in jprofiler.properties . | | “License server not running” | Server process stopped or crashed | Check server logs ( license-server.log ), restart the JVM, ensure sufficient heap ( -Xmx256m ). | | “License key not found” on CI agents | Environment variable not propagated in container | Add -e JPROFILER_LICENSE_KEY=/path/to/jprofiler.lic to Docker run command or mount the file as a volume. | jprofiler license key
Answers
<Header>.<Payload>.<Signature> | Component | Description | |-----------|-------------| | | JSON metadata (algorithm, version). Example: "alg":"RS256","typ":"JPROF" | | Payload | Encrypted JSON object containing: • type – “node”, “floating”, “enterprise”, or “trial”. • exp – UNIX timestamp of expiration. • issued – Issue date. • host – For node‑locked: MAC address / Windows SID. • maxClients – For floating: max concurrent sessions. • features – Enabled modules (CPU, memory, database, etc.). | | Signature | RSA‑2048 signature generated by ej‑technologies’ private key, ensuring tamper‑proofness. |
auth: type: ldap url: ldap://ad.example.com baseDn: dc=example,dc=com bindDn: cn=serviceaccount,ou=users,dc=example,dc=com bindPassword: $LDAP_BIND_PASSWORD | Phase | Recommended Action | |-------|---------------------| | Provisioning | Store the key in a read‑only directory with restricted OS permissions (e.g., chmod 440 ). Use a secrets‑management tool (Vault, Azure Key Vault) for automated CI pipelines. | | Distribution | For node‑locked keys, use a configuration‑management tool (Ansible, Chef) to push the file. For floating, keep the server binary under version control and deploy via container orchestration (Docker/K8s). | | Renewal | Set calendar reminders 30 days before exp timestamp. The portal provides a “Renew” button that issues a new key with an extended expiry while preserving the same host binding. | | Revocation | If a workstation is decommissioned, re‑issue a new node‑locked key (excluding the retired host). For floating servers, simply remove the host from the allowed IP list in config.yml . | | Auditing | Enable JProfiler’s license‑usage logs ( jprofiler.log ) and forward them to a SIEM. Logs contain entries such as License granted to host <MAC> , Floating license checked out by user X . | 7. Common Issues & Troubleshooting | Symptom | Likely Cause | Fix | |---------|--------------|-----| | “Invalid license key” dialog at startup | Corrupted .lic file (line‑breaks, whitespace) | Re‑download from portal; ensure file is stored exactly as received. | | “License expired on …” | Expiration date reached (check exp field with a Base64 decoder) | Renew license via portal; replace the key. | | “Host mismatch” (node‑locked) | The key was generated for a different MAC/Windows SID | Regenerate the key for the current host; verify host identifier using jprofiler --show-host-id . | | “Maximum number of concurrent users reached” (floating) | All floating slots are occupied | Increase maxClients in the server configuration or free a slot (stop a profiler session). | | “Cannot connect to license server” | Network/firewall block on port (default 8849) | Open the port; configure proxy settings in jprofiler.properties . | | “License server not running” | Server process stopped or crashed | Check server logs ( license-server.log ), restart the JVM, ensure sufficient heap ( -Xmx256m ). | | “License key not found” on CI agents | Environment variable not propagated in container | Add -e JPROFILER_LICENSE_KEY=/path/to/jprofiler.lic to Docker run command or mount the file as a volume. |
|
|
|
|
|